c) Security Flashcards

1
Q

safeguarding files and records

A
  • data can be protected through the use of internal and external labels and file protection rings
  • ALL critical application data should be backed up and stored in a secure off site lcoation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Son-Father-Grandfather concept

A
  • Whats the version of the data
  • The most recent file is the son, second most recent file is the father and the preceding file is the gfather
  • Process includes reading the previous file, recording (adding) transactions being processed and creating a new updated master file.
  • There are always at least two backup files that can be used to recreate the destroyed file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backups of systems that can be shut down

A

files or databases that have changed since the last backup (or just all data) can be backed up using son, father, gfather concept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Backups of systems that do not shut down

A

files or databases that have changed since the last backup (or just all data) can be backed up sing son, father, gfather concept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

mirroring

A

use of a backup computer to duplicate all of the processes and transactions on the primary computer-can be expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Uninterrupted Power supply

A

device that maintains a continuous supply of electrical power to connected equipment. A UPS is also called a battery backup. The battery will eventually run out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

program modification controls

A

include both controls designed to prevent changes by unauthorized personnel and controls that track program changes so that there is a record of what versions of what programs are running in production at any specific point in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

data encryption

A
  • essential foundation for electronic commerce
  • uses a password or digital key to scramble a readable (plaintext) message into an unreadable (ciphertext) mesasge.
  • the intended recipient then uses another digital key to decrypt or decipher the message back into plaintext.
  • the longer the length of the key, the less likely is the message to be decrypted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

brute force attack

A

attacker simply tries every possible key until the right one is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

digital certificates

A

electronic docs created and digitally signed by a trusted party which certifies the identity of owners of a particular public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PKI

A

Public key infrastructure

  • the system and processes used to issue and manage asymmetric keys and digital certificates.
  • the org that issues public and private keys and records the public key in the digital certificate is called a certificate authority -IE Verasign
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital signatures

A

Use asymmetric encryption to create legally binding electronic documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Esignature

A

an alternative to digital signatures and are provided by vendors as a software product. They are legally binding, as if the user had really signed the paper copy of the document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Managing passwords

A

The first rule in password policy is that every account must have a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password length

A

general rule: minimum of 7 or 8 characters for password length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password complexity

A

feature three of the four characteristics:

  • uppercase
  • lowercase
  • numeric characters
  • symbols
17
Q

password age

A

no true standard; changing every 90 days is considered a good policy. Admin passwords should be changed more frequently

18
Q

Password reuse

A

no true standard; passwords should not be reused until a significant amount of time has passed

19
Q

initial passwords and authorization for user access to system

A

HR should generate the request for a user account and system access rights; Based on the level of access being granted, the Info Security officer may need to approve account

20
Q

Changes in position

A

Require the coordination of effort between HR & IT; It is important to have procedures in place for changes in jobs/roles and to remove access/disable accounts for terminated employes

21
Q

Policies

A

the most crucial element in a corporate information security infrastructure; must be considered long before security technology is acquired and deployed

22
Q

Security policy

A

document that states how an org plans to protect its tangible and intangible information assets

  • mgmt instructions indicating a course of action, principle or procedure
  • high level stmts providing guidance to workers who must make present and future decisions
23
Q

security policy goal

A

require people to protect info, which in turn protects hte org, its employees and its customers

24
Q

security policy secures information in 3 states

A

Stored information
Processed information
Transmitted information

25
Q

info resides in the following locations

A

IT systems
paper
human brain

26
Q

Program level policy

A

used for creating a mgmt sponsored computer security program. Might prescribe the need for info security and may delegate the creation and mgmt of a program to a role in the IT dept. This is the mission statement for the IT security program.

27
Q

Program framework policy

A

this is the IT security strategy-to achieve the mission statement. Establishes overall approach to computer security.

28
Q

issue specific policy

A

address specific issues of concern to the org ie-cloud computing

29
Q

system specific policy

A

focus on policy issues that exist for a specific system ie-payroll system

30
Q

3 level model to develop a comprehensive set of system polices

A

Security objectives
Operational security
Policy Implementation

31
Q

Security objectives

A

consist of a series of statements to describe meaningful actions about specific resources. Should be based on system functionality or mission reqs and state security actions to support the reqs
ie-confidentiality, data integrity, authorization, access, resource protection

32
Q

Operational security

A

define the manner in which a specific data operation would remain secure
ie-individuals authorized to make modifications

33
Q

policy implementation

A

ie-technology can be used to block telephone systems from calling certain numbers, website blocks, intrusion detection software